A system and method for proactively detecting cloning fraud in a cellular mobile telephone environment are discussed. Information is collected which corresponds to registration notifications of the cellular telephones as they operate within the cellular mobile telephone environment. The registration information is used to detect time-space peculiarities. Specifically, registrations having the same mobile identification number and occurring in different mobile switching centers within a predetermined time interval are identified. This time interval, based on a reasonable travel time between cells covered by the different mobile switching centers where the registrations originated, is used as a threshold for detecting cloning fraud.
|
19. A method for detecting cloning fraud in a mobile telephone environment, comprising the steps of:
receiving a plurality of registration notifications identifying a same particular mobile user; obtaining a creation time and an originating location for each of said plurality of registration notifications; and determining whether cloning fraud has occurred based on said creation times and said originating locations.
17. A method for detecting cloning fraud in a mobile telephone environment, comprising the steps of:
receiving a plurality of registration notification each identifying a same particular mobile user; and determining, as a function of a time of creation of each of said plurality of registration notifications and a location identified as the location of a mobile telephone that caused the creation of each of said plurality of registration notifications, whether an instance of cloning fraud has occurred.
1. A method for proactively detecting cloning fraud in a mobile cellular telephone environment, comprising the steps of:
(1) collecting a plurality of registration notifications each represented by a registration notification (regnot) record comprising a mobile identification number (min), a time stamp of said registration notification, and originating indicia identifying a cell where said registration notification originated; (2) detecting a first regnot record and a second regnot record having a common min; (3) computing a time difference between time stamps of said first and second regnot records; and (4) determining whether cloning fraud involving said common min has occurred based on said time difference.
14. A method for proactively detecting cloning fraud in a mobile cellular telephone environment, comprising the steps of:
receiving a plurality of registration notifications each having a mobile identification number for identifying a mobile user in the mobile cellular telephone environment; obtaining a time stamp and an originating indicia for each of said plurality of registration notifications, wherein said time stamp indicates when and said originating indicia indicates where each of said plurality of mobile identification numbers was received; and determining whether an instance of cloning fraud has occurred based on said time stamps and said originating indicias of two of said plurality of registration notifications having a same mobile identification number.
10. A computer-based system for proactively detecting cloning fraud in a mobile cellular telephone environment, comprising:
storing means for storing a plurality of registration notifications each represented by a registration notification (regnot) record, each regnot record comprising a mobile identification number (min), a time stamp of said registration notification, and originating indicia identifying a cell where said registration notification originated; detecting means for detecting a first regnot record and a second regnot record having a common min; computing means for computing a time difference between time stamps of said first and second regnot records; means for determining whether cloning fraud involving said common min has occurred based on said time difference; and reporting means for reporting said occurrence of cloning fraud involving said common min.
5. A method for proactively detecting cloning fraud in a mobile cellular telephone environment, comprising the steps of:
(1) storing a plurality of registration notifications each represented by a registration notification (regnot) records, each regnot record comprising a mobile identification number (min), a time stamp of said registration notification, and originating indicia identifying a cell where said registration notification originated; (2) forming a clone data window comprising a plurality of said regnot records occurring within a predetermined time frame; (3) detecting in said clone data window a first regnot record and a second regnot record having a common min; (4) computing a time difference between time stamps of said first and second regnot records; (5) determining whether cloning fraud involving said common min has occurred based on said time difference; and (6) recording said occurrence of cloning fraud involving said common min.
2. The method of
3. The method of
4. The method of
6. The method of
7. The method of
8. The method of
9. The method of
11. The system of
12. The system of
13. The system of
15. The method of
computing a time difference between time stamps of said two of said plurality of registration notifications having the same mobile identification number; and comparing said time difference to a time needed to travel between said cells indicated by said originating indicias.
16. The method of
18. The method of
20. The method of
|
1. Field of the Invention
The present invention relates generally to cellular/PCS (Personal Communications Services) telephone communications. Specifically, the present invention relates to detecting cloning fraud in a cellular/PCS environment.
2. Related Art
Cellular mobile telephone systems provide direct-dial telephone service to mobile users by using radio transmission. The service area of a cellular mobile telephone system is divided into regions called cells. Within each cell is a base station which includes a transmitter and a receiver. Each base station is connected to a mobile switching center (MSC) which processes calls to and from mobile users located in the cell. Each transmitter and receiver operates on a voice channel (frequency). A single channel may be used for many simultaneous conversations (voice signals) in cells which are sufficiently separated from one another such that excessive interference is avoided. However, as the number of mobile users increases within a cell, the cell may become too crowded to provide adequate separation. When a cell becomes overcrowded, the cell must be split into smaller cells with each cell covering a smaller geographic area. Each new cell requires a new base station which is connected to the original MSC. Thus, as the number of cells increases, each MSC may be processing calls for multiple cells.
As a mobile user travels with his cellular telephone powered up, the cellular telephone autonomously registers the mobile user by sending signals with information identifying the mobile user to the MSC serving the cell where the mobile user is currently located. The sending and receipt of such information is referred to as registration notification. The information included in a registration notification is the mobile user's mobile identification number (MIN) and an electronic serial number (ESN). The MIN uniquely identifies each mobile user in a manner similar to a conventional telephone number. The ESN is encoded into each cellular telephone. The ESN functions as a security password verifying the validity of the MIN and allowing the mobile user access to the cellular mobile telephone system.
The MSC collects registration notifications and provides them to other facilities in the cellular mobile telephone system. These facilities primarily use the registration notifications to facilitate incoming and outgoing calls. Typically, a mobile user subscribes for services with the MSC covering the cell, or group of cells, where the mobile user primarily resides or conducts business. This MSC is referred to as the mobile user's home MSC. All other MSCs in the cellular mobile telephone system are known as visited MSCs with respect to the mobile user. When a mobile user ventures beyond the cells covered by the home MSC, the mobile user is said to be "visiting." For purposes of this discussion, a mobile user inside a cell of a visited MSC is referred to as a visiting mobile user.
When a mobile user powers on his cellular telephone or crosses cell boundaries covered by different MSCs, the cellular telephone, at some point, autonomously sends a signal representing a registration notification. The MSC covering the cell (i.e., either a home MSC or a visited MSC) receives the registration notification. Based on the MIN and ESN contained in the registration notification, the MSC queries a Roamer Validation and Call Delivery (RVCD) facility to validate the mobile user's subscription information. The RVCD stores the subscription information for all mobile users in the cellular mobile telephone system in a Home Location Register (HLR). The HLR identifies each of the mobile users home MSC, the services to which each mobile user is subscribed, and whether each subscription is valid.
After receiving a query from the MSC, the RVCD responds by sending the requested the information included in the HLR back to the querying MSC. The MSC maintains this information to provide cellular mobile telephone services to the mobile user as long as the mobile user remains in cells covered by the MSC.
Registration notification is important for several reasons. Primarily, registration notification is used to provide cellular mobile telephone services to mobile users outside of the cells of the home MSC (as described above). Thus, a mobile user can utilize cellular mobile telephone services throughout the cellular mobile telephone system.
Registration notification is also important for routing incoming calls to mobile users. When an incoming call is to be routed to a mobile user, the mobile user must be located so that the call can be routed through the proper MSC to the mobile user. In the case of a conventional telephone user (i.e., not a mobile user) attempting to place a call to a mobile user, the home MSC receives the incoming call from the regular telephone user and determines whether the mobile user is active, or operating, in the cell of the home MSC. If the mobile user is not active within the cell of the home MSC, the mobile user may: 1) not have his telephone powered up, or 2) be active in the cell of a visited MSC. In the first case, the incoming call cannot be routed to the mobile user. In the second case, the RVCD attempts to locate the mobile user within the cellular telephone system.
The RVCD functions as a clearing house for a cellular mobile telephone system. Specifically, the RVCD validates mobile users and manages activation, deactivation, and changes in subscription profiles of mobile users. The RVCD also stores a copy of each registration notification received from the MSCs. Furthermore, the RVCD updates the HLR to indicate the MSC where the latest registration notification originated (this is called the originating MSC). This allows the RVCD to track where each mobile user is currently located in the cellular mobile telephone system.
Tracking mobile users within the cellular mobile telephone system serves to facilitate the routing of incoming calls to mobile users. When an incoming call is placed to a mobile user who is not within the cell of the home MSC, the home MSC can query the RVCD to locate the mobile user based on the origination of the registration notification maintained in the HLR. The the incoming call can then be routed to the originating MSC which connects the incoming call via radio communication signals to the mobile user. In the preferred embodiment, two RVCD systems are used in parallel to provide backup for the cellular mobile telephone system in case one RVCD should fail.
A problem existing in current cellular mobile telephone systems is cloning fraud. Cloning fraud occurs when one mobile user (called an unauthorized user) obtains and fraudulently uses the MIN and ESN registered to another mobile user (called an authorized user) in order to obtain "free" service. As used herein, the term "valid MIN" refers to a MIN when being used by an authorized mobile user. The term "cloned MIN" refers to a MIN when being used by an unauthorized mobile user.
The cellular mobile telephone system uses the MIN and ESN associated with each mobile telephone call to bill the authorized mobile user registered with that MIN and ESN. When a MIN and ESN are "cloned", the authorized mobile user gets billed for calls made with the valid MIN as well as those calls made using the cloned MIN. Cloning fraud costs the cellular telephone industry millions of dollars in lost revenue each year. What is needed is a means for detecting cloning fraud in a cellular/PCS environment.
The present invention is directed to a system 200 and method for proactively detecting cloning fraud in a cellular/PCS (Personal Communications Services) environment. According to the invention, the system detects cloning fraud by comparing the time and location of registration notifications having the same mobile identification number (MIN). Cloning fraud is reported when the computed time difference between such registration notifications is less than a reasonable travel time between the cells of the originating mobile switching centers (originating MSCs).
Further features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with reference to the accompanying drawings.
The present invention is described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left-most digit(s) of a reference number identifies the drawing in which the reference number first appears.
FIG. 6. illustrates an example clone detection table used by the invention.
In general, a mobile user 130 registers with a MSC 120 by sending its MIN and ESN using well known wireless communication techniques (i.e., via a radio signal 220). Radio signal 220 containing mobile user's MIN and ESN is sent at a predetermined time interval while the mobile user 130 is operating to notify the MSC 120 of its presence within the cell 110 where the MSC 120 is located. This is referred to as registration notification. The MSC 120 receives the radio signal 220 as a registration notification (REGNOT) query. A REGNOT query includes a MIN, a time stamp representing a time when the registration notification was received by the MSC 120, and an originating MSC indicia identifying which MSC 120 received the registration notification. The MSC 120 sends the REGNOT query to one of the RVCDs 204 which processes the REGNOT query and creates a record of the query for subsequent retrieval by PSMS 202 (described below).
For example, at 10:30 am, a mobile user 130G operating in a cell 110G sends a radio signal 220 containing a registration notification. The MSC 120G receives the signal 220 and creates a REGNOT query. The REGNOT query includes the mobile user 130G's MIN, a time stamp of 10:30 am (i.e., the time when the registration notification was received), and an originating MSC indicia identifying MSC 120G (i.e., the identity of the MSC receiving the registration notification). The REGNOT query is sent to either RVCD 204A or RVCD 204B which stores the query as a REGNOT record.
As discussed previously, each RVCD 204 functions as a clearing house for the cellular mobile telephone system 200 by maintaining information regarding the mobile users 130. This information includes the cellular mobile telephone services to which each mobile user 130 subscribes and the cell where each operating mobile user 130 is currently located. RVCDs 204 maintain this information in a master list referred to as a Home Location Register (HLR). The information regarding the cell where each operating mobile user 130 is currently located is updated from REGNOT queries received from the MSCs 120. At a predetermined time interval (i.e. determined by individual system implementation requirements), each RVCD 204 sends the REGNOT records to the PSMS 202 which performs various processing of the information. The PSMS 202 includes a clone detection system (CDS) 210 which processes the REGNOT records to identify instances of cloning fraud.
The PSMS 202 receives the REGNOT records, indicated by reference number 318 in
Fraud manager 304 collects several half hour data groups 310 from the REGNOT record file 312 and forms a clone detection window 308 (such half hour data groups 310 are stored in memory, such as random access memory). The clone detection window 308 collectively represents all registration notifications (represented by REGNOT records 318) received by the MSCs 120 within the cellular mobile telephone system 200 during a predetermined time frame. In the preferred embodiment, the fraud manager 304 forms a clone detection window 308 from the most recent thirteen half hour data groups 310 arranged from oldest in time to newest in time. Accordingly, the clone detection window 308 represents all registration notifications received within the past 6.5 hours by all MSCs 120 in the cellular mobile telephone system 200.
Clone detection window 308 is a sliding window, representing registration notifications occurring within a specified time interval (i.e. the last 6.5 hours). As the window "slides" (i.e. time passes), new registration notifications are added to the window and old ones are removed. Thus, only those registration notifications occurring within the specified time interval are processed together by fraud manager 304.
The fraud manager 304 determines whether cloning fraud exists by determining whether time-space peculiarities exist within the clone detection window 308. A time-space peculiarity exists when registration notifications with the same MIN originated in different locations within a time insufficient to travel between the different locations. In such cases, at least one of the registration notifications is likely to be an instance of cloning fraud.
In the preferred embodiment, the fraud manager 304 detects cloning fraud by comparing the difference between the time stamps of the REGNOT records 318 in the clone detection window 308 having the same MIN with a reasonable travel time between the locations of the cells of the originating MSCs. For example, referring to
The previous example has been provided to illustrate the operation of the clone detection system 210 and not as a limitation. In the preferred embodiment, the clone detection window 308 is 6.5 hours wide (chosen as the minimum reasonable time to travel across the United States) and encompasses a much larger time frame than the example illustrates. Furthermore, it would be apparent for one skilled in the art to adjust the width of the clone detection window 308 depending on the geographic area covered by the cellular mobile telephone system 200.
Referring again to
The preferred embodiment uses RVCDs 204 to store the HLR and collect the REGNOT queries for each of the MSCs 110. One skilled in the art would recognize that other implementations or divisions of processing could be utilized for clone detection system 210. For example, the PSMS 202 could be directly connected to each MSC 110 and handle the registration notifications without any RVCDs 204. Furthermore, data could be processed in other that half hour increments, or in fact, immediately upon receipt.
In a step 404, the fraud manager 304 reads a MIN from a first REGNOT record 318, (i.e., the oldest record with respect to time) in the clone detection window 308. In a step 406, the fraud manager 304 reads a MIN from a second REGNOT record 318 in clone detection window 308. In a decision step 408, the fraud manager 304 compares the MIN from the first REGNOT record with the MIN from the second REGNOT record to determine if the MINs are the same. If the MINs are the same (indicating the same registered mobile user), processing continues at a step 410; otherwise, processing continues at a decision step 414.
In step 410, the fraud manager 304 handles a possible clone detection, as discussed in greater detail below. After handling a possible clone detection, the fraud manager 304, in a step 412, notes that it should use the second REGNOT record in place of the first REGNOT record in future performances of step 408 and 410, so that future occurrences of the same MIN will be compared (in step 502, as described below) with the time stamp of the second REGNOT record rather than that of the first.
In decision step 414, the fraud manager 304 determines whether the entire clone detection window 308 has been searched for the occurrence of the MIN obtained in step 404. If the entire clone detection window 308 has been searched, processing continues at a step 416; otherwise, processing returns to step 406 to get a new second REGNOT record 318 from the clone detection window 308 and continue searching for the same MIN.
In step 416, the fraud manager 304 excludes from further consideration all REGNOT records 318 having the MIN obtained in step 404. In a step 418, the fraud manager 304 determines whether any REGNOT records 318 remain in the clone detection window 308 that contain MINs that have not yet been checked for cloning fraud. If no REGNOT records 318 remain to be checked, processing ends in a step 420; otherwise, processing returns to step 404 to get a new first REGNOT record 318 containing a new MIN to check for cloning fraud.
In step 508, the fraud manager 304 records a likely instance of cloning fraud in the clone record file 314. The fraud manager stores the MIN, both originating MSCs, the clone detection time, and the time stamp difference for later action/reporting by the clone detection system 210. In addition to a daily report of cloning activity, such action/reporting may include an alarm displayed to personnel in cellular mobile telephone system 200 or removal of the suspected clone from service. After step 508, processing continues at step 412.
While the invention has been particularly shown and described with reference to several preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Gerth, Donald M., Kamath, Yogeesh H., Rooney, Timothy J.
Patent | Priority | Assignee | Title |
10200870, | Nov 20 2014 | AT&T MOBILITY II LLC; AT&T Intellectual Property I, L.P. | Detection and blocking of cloned mobile devices |
10484873, | Nov 20 2014 | AT&T Intellectual Property I, L.P.; AT&T MOBILITY II, LLC | Detection and blocking of cloned mobile devices |
11516765, | Nov 14 2019 | Qualcomm Incorporated | False base station detection based on time of arrival or timing advance |
11538063, | Sep 12 2018 | SAMSUNG ELECTRONICS CO , LTD | Online fraud prevention and detection based on distributed system |
11570610, | Apr 03 2020 | Telus Corporation | System and method for managing visitor location register (VLR) records by updating duplicate records |
11716700, | Nov 14 2019 | Qualcomm Incorporated | False base station detection based on time of arrival or timing advance |
6529727, | Sep 07 1999 | CLUSTER, LLC; Optis Wireless Technology, LLC | Automatic expiration of wireless communication service subscriptions |
6535728, | Nov 18 1998 | VECTOR TRADING CAYMAN , L P | Event manager for use in fraud detection |
6999751, | Apr 08 2004 | Google Technology Holdings LLC | Detection of cloned communication units based on message contents |
7355990, | Apr 25 2005 | INTELLECTUAL PROPERTIES I KFT | Mobile-originated to HTTP internet communications |
7428510, | Feb 25 2000 | TELECOMMUNICATION SYSTEMS, INC | Prepaid short messaging |
7430425, | May 17 2005 | TeleCommunication Systems, Inc. | Inter-carrier digital message with user data payload service providing phone number only experience |
7519654, | Nov 22 2000 | TELECOMMUNICATION SYSTEMS, INC | Web gateway multi-carrier support |
7522911, | Apr 11 2000 | TELECOMMUNICATION SYSTEMS, INC | Wireless chat automatic status tracking |
7555285, | Apr 08 2004 | Google Technology Holdings LLC | Detection of cloned communication united based on message contents |
7610040, | Feb 21 2003 | INTERDIGITAL CE PATENT HOLDINGS, SAS | Method and system for detecting possible frauds in payment transactions |
7634252, | Mar 07 2003 | GOOGLE LLC | Mobility management in wireless networks |
7809359, | Apr 11 2000 | TeleCommunication Systems, Inc. | Wireless chat automatic status tracking |
7809382, | Apr 11 2001 | TELECOMMUNICATION SYSTEMS, INC | Short message distribution center |
7853272, | Dec 21 2001 | TeleCommunication Systems, Inc. | Wireless network tour guide |
7853511, | Feb 25 2000 | TeleCommunication Systems, Inc. | Prepaid short messaging |
7890127, | Sep 05 2001 | TeleCommunication Systems, Inc. | Inter-carrier messaging service providing phone number only experience |
7894797, | Apr 11 2000 | TeleCommunication Systems, Inc. | Wireless chat automatic status signaling |
7929513, | Oct 30 2006 | AT&T Intellectual Property I, LP | Wireless local area network access points, end-point communication devices, and computer program products that generate security alerts based on characteristics of interfering signals and/or connection messages |
8027675, | Dec 16 2004 | Samsung Electronics Co., Ltd; SAMSUNG ELECTRONICS CO , LTD | Apparatus and method for controlling registration of mobile identification number of mobile communication terminals |
8060429, | Feb 25 2000 | TeleCommunication Systems, Inc. | Prepaid short messaging |
8073477, | Apr 11 2000 | TeleCommunication Systems, Inc. | Short message distribution center |
8175953, | Feb 25 2000 | TeleCommunication Systems, Inc. | Prepaid short messaging |
8244220, | Apr 11 2000 | TeleCommunication Systems, Inc. | Wireless chat automatic status tracking |
8260329, | Apr 18 2000 | INTELLECTUAL PROPERTIES I KFT | Mobile-originated to HTTP communications |
8265673, | Apr 11 2000 | TeleCommunication Systems, Inc. | Short message distribution center |
8380165, | Oct 22 2010 | Sprint Communications Company L.P. | Identifying a cloned mobile device in a communications network |
8483729, | Sep 05 2001 | TeleCommunication Systems, Inc. | Inter-carrier messaging service providing phone number only experience |
8577339, | Apr 11 2000 | TeleCommunication Systems, Inc. | Wireless chat automatic status signaling |
8682362, | Sep 05 2001 | TeleCommunication Systems, Inc. | Inter-carrier messaging service providing phone number only experience |
8738496, | Feb 25 2000 | TeleCommunication Systems, Inc. | Prepaid short messaging |
8744491, | Dec 21 2001 | TeleCommunication Systems, Inc. | Wireless network tour guide |
8750183, | Apr 18 2000 | INTELLECTUAL PROPERTIES I KFT | Mobile-originated to HTTP communications |
8929854, | Oct 27 2011 | ARTAX, LLC | Emergency text messaging |
8954028, | Sep 25 2008 | TELECOMMUNICATION SYSTEMS, INC | Geo-redundant and high reliability commercial mobile alert system (CMAS) |
9191520, | Dec 13 2010 | TELECOMMUNICATION SYSTEMS, INC | Location services gateway server |
9204277, | Oct 27 2011 | ARTAX, LLC | Emergency text messaging |
9408047, | Oct 10 2013 | TELECOMMUNICATION SYSTEMS, INC | Read acknowledgement interoperability for text messaging and IP messaging |
9572036, | Nov 20 2014 | AT&T MOBILITY II LLC | Detection and blocking of cloned mobile devices |
9942770, | Nov 20 2014 | AT&T Intellectual Property I, L.P.; AT&T MOBILITY II LLC | Detection and blocking of cloned mobile devices |
RE41006, | Sep 05 2001 | TeleCommunication Systems, Inc. | Inter-carrier short messaging service providing phone number only experience |
Patent | Priority | Assignee | Title |
4876738, | Sep 18 1986 | U S PHILIPS CORPORATION | Mobile radio transmission system |
5077790, | Aug 03 1990 | Motorola, Inc. | Secure over-the-air registration of cordless telephones |
5243652, | Sep 30 1992 | GTE Laboratories Incorporated | Location-sensitive remote database access control |
5335265, | Nov 08 1991 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Apparatus for detecting and preventing subscriber number cloning in a cellular mobile telephone system |
5335278, | Dec 31 1991 | ST CLAIR INTELLECTUAL PROPERTY CONSULTANTS, INC , A MICHIGAN CORPORATION | Fraud prevention system and process for cellular mobile telephone networks |
5345595, | Nov 12 1992 | AUTHORIZE NET LLC | Apparatus and method for detecting fraudulent telecommunication activity |
5455863, | Jun 29 1993 | Google Technology Holdings LLC | Method and apparatus for efficient real-time authentication and encryption in a communication system |
5475735, | Dec 02 1993 | Google Technology Holdings LLC | Method of providing wireless local loop operation with local mobility for a subscribed unit |
5535431, | Apr 05 1994 | Google Technology Holdings LLC | Method of detecting unauthorized use of a communication unit |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 11 1994 | GERTH, DONALD M | AT&T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 007261 | /0125 | |
Nov 11 1994 | KAMATH, YOGEESH H | AT&T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 007261 | /0125 | |
Nov 14 1994 | ROONEY, TIMOTHY J | AT&T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 007261 | /0125 | |
Nov 23 1994 | Lucent Technologies Inc. | (assignment on the face of the patent) | / | |||
Mar 29 1996 | AT&T Corp | Lucent Technologies Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 032883 | /0925 | |
Nov 01 2008 | Lucent Technologies Inc | Alcatel-Lucent USA Inc | MERGER SEE DOCUMENT FOR DETAILS | 032883 | /0932 | |
Jan 30 2013 | Alcatel-Lucent USA Inc | CREDIT SUISSE AG | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 030510 | /0627 | |
Aug 19 2014 | CREDIT SUISSE AG | Alcatel-Lucent USA Inc | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 033950 | /0001 |
Date | Maintenance Fee Events |
Sep 16 2005 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jun 20 2007 | ASPN: Payor Number Assigned. |
Oct 05 2009 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Oct 07 2013 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 09 2005 | 4 years fee payment window open |
Oct 09 2005 | 6 months grace period start (w surcharge) |
Apr 09 2006 | patent expiry (for year 4) |
Apr 09 2008 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 09 2009 | 8 years fee payment window open |
Oct 09 2009 | 6 months grace period start (w surcharge) |
Apr 09 2010 | patent expiry (for year 8) |
Apr 09 2012 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 09 2013 | 12 years fee payment window open |
Oct 09 2013 | 6 months grace period start (w surcharge) |
Apr 09 2014 | patent expiry (for year 12) |
Apr 09 2016 | 2 years to revive unintentionally abandoned end. (for year 12) |